Explore chapters and articles related to this topic
Building Cloud Networks
Published in John W. Rittinghouse, James F. Ransome, Cloud Computing, 2017
John W. Rittinghouse, James F. Ransome
For operating system development tasks, virtualization has a significant additional benefit—running the new system as a guest avoids any need to reboot the computer whenever a bug is encountered. This protected or insulated environment is known as a “sandbox,” and such sandboxed guest systems are useful in computer security research and development. In order to study the effects of malware, viruses, and worms without compromising the host system, developers often prefer to use a sandbox. Hardware appliance vendors increasingly have begun to ship their products preconfigured with several guest systems. This allows them to deliver complex solutions that are able to execute various software applications running on different operating systems.
Research on a malicious code behavior acquisition method based on the Bochs virtual machine
Published in Jimmy C.M. Kao, Wen-Pei Sung, Civil, Architecture and Environmental Engineering, 2017
System call monitoring method intercepts the system calls during the execution of the code. The method can acquire the operation of code execution in real time, which can be used for the analysis of behavior characteristics as well as the detection of malicious code. To avoid being infected by the malicious code, the sandbox technology is generally used to execute the malicious code samples, and the virtual machine is a typical kind of sandbox.
EEMS2015 organizing committee
Published in Yeping Wang, Jianhua Zhao, Advances in Energy, Environment and Materials Science, 2018
Sandbox technology. Sandbox technology to limit application process runs in a separate environment, this process has no ability to access resources beyond the sandbox, but also can’t detect any sandbox environment. Sandbox technology has two main functions, one greatly limits the damage of malicious programs on the system, and second, the system also makes hacking more difficult.
Multi-objective auto-scaling scheduling for micro-service workflows in hybrid clouds
Published in Enterprise Information Systems, 2023
Shijia Wang, Xuan Liu, Ming Gao, Mingxia Chen, Kai Leung Yung, Shancheng Jiang
However, VMs have the disadvantages of slow start-up speed, low resource utilisation and low task execution efficiency. The emerging of container technology (Cheng 2018) aims to alleviate aforementioned inefficiency by light-weight, kernel-sharing para-virtualisation. Container shares the kernel, CPU, memory and other resources of the host operating system with each other, but provides a sandbox execution mechanism to maintain its own running environment, unlike the VM, which reduces the overheads of hardware virtualisation and guest OS. Because of its fast start-up speed, low resource overhead and portability (Watada et al. 2019), the container-based cloud service is more suitable for modern high-density micro-service workflows. Microservices architecture, which is inherently harmonised with the container approach, has advantages for resource utilisation in cloud computing. Elrotub (Elrotub, Bali, and Gherbi 2021) proposed a model that allows each virtual machine (VM) to maximise the serving number of requests based on its capacity. With the increasing popularity of microservice in the actual activities of enterprises, the adoption of containers is expected to be further expanded (Jamshidi et al. 2018), such as autonomous vehicles (Wang and Bao 2019), satellite scheduling (Xhafa and Ip 2019), and smart infrastructures (Jaiswal et al. 2018).